Hack Hack Hack Hack It Apart

Researchers Say the Cloud Could Aid in Large-Scale Cyber Attacks

Not all clouds are security threats. (flickr.com/kky)

Researchers at North Carolina State University and the University of Oregon have discovered a way to turn cloud computing into hacker heaven.

Disguising data transfers with URL-truncating services like TinyURL or Bit.ly, researchers found that cloud-based processing power intended to shift computing tasks from laptops, tablets and mobile devices could be converted to crack encoded passwords or used for a large scale denial-of-service attack. Read More

Hack Hack Hack Hack It Apart

Samsung’s Galaxy 3 is Vulnerable to Remote Wiping by Hackers [VIDEO]

Ravi Borgaonkar demonstrating Galaxy handset flaws. (Screengrab)

During a recent security conference in South America, a Berlin-based researcher revealed that Samsung has a major problem with its iPhone challengers, the Galaxy 3 and Galaxy S2 smartphones.

Both can easily be remotely wiped by code embedded in a web page.

Ravi Borgaonkar found that the Galaxy’s “service loading” feature, its method of communicating with application servers, can be exploited with just one line of code tucked away in a web page’s HTML. If the attack is successful, the malicious code reverts the phones to their factory settings. Worse still, once the attack begins, the phone’s user can’t do a thing about it.

That’s bad enough. There’s also this: Read More

Hack Hack Hack Hack It Apart

Demo Shows How Easily Your iPhone 4S and Android Phone Can Be Hacked

Hope you don't get cancer, CEO guy. (flickr.com/perspective)

Attendees at the EuSecWest-sponsored World Security Professional Summit in Amsterdam are participating in a contest called Mobile Pwn2Own. Contestants are, yes, basically revealing that our mobile devices can be easily pwned by someone with the know-how. Quell your bubbling phone fanboy or fangirl rage right now: it looks like both Androids and iPhones are vulnerable. The Next Web describes the Android pwnage, which was partially done, by the way, via near-field communication, or NFC: Read More